Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

UMTS and HSPA/HSPA+ and LTE Security Training

UMTS and HSPA/HSPA+ and LTE Security Training

UMTS and HSPA/HSPA+ and LTE Security Training:

UMTS and HSPA/HSPA+ and LTE Security Training Course Description

Having completed this UMTS and HSPA/HSPA+ and LTE Security Training course the participant will be able to understand how security is implemented, deployed, and managed in | HSPA/HSPA+ and LTE networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Your Registration Includes

  • 3 days of  UMTS and HSPA/HSPA+ and LTE Security Training with an expert instructor
  • UMTS and HSPA/HSPA+ and LTE Security Electronic Course Guide
  • 100% Satisfaction Guarantee
  • Certificate of Completion

Resources:

Related Courses

Customize It:

  • If you are familiar with some aspects of UMTS and HSPA/HSPA+ and LTE Security Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the UMTS and HSPA/HSPA+ and LTE Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the UMTS and HSPA/HSPA+ and LTE Security Training course in a manner understandable to lay audiences.

Objectives:

After completing this UMTS and HSPA/HSPA+ and LTE Security Training course, attendees will be able to:

  • The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in HSPA/HSPA+ and LTE radio and core network. The course focuses both on the air interface and the enhanced core network.

Course Outline:

Overview of Security Concepts

  • Basic security concepts
  • Authentication
  • Privacy
  • Integrity
  • Authorization
  • Non-repudiation

Encryption

  • Encryption Technologies
  • Cryptography Keys
  • Symmetric and Asymmetric
  • Ciphers
  • Cipher Suites
  • Certificates

Overview of Wireless Security Requirements

  • Wireless security needs
  • Basic GSM, GPRS, UMTS, and LTE security functions

GSM, EGPRS, UMTS/HSPA/HSPA+ and LTE Security Framework

  • GSM, EGPRS and UMTS/HSPA/HSPA+ and LTE Security Functions
  • GSM Security Review
  • GPRS Security Review
  • UMTS Security Overview
  • LTE Security Overview
  • Ciphering, Authentication, and Authorization Procedures
  • RAN Security
  • Core Network Security
  • Lawful Interception (LI)
  • Mobile Application Part Security
  • MAPsec overview

UMTS Security Architecture

  • GSM, EGPRS Security Architecture
  • UMTS and HSPA/HSPA+ security features
  • Network access mechanisms
  • UMTS authentication and authorization procedures
  • Key agreement
  • Local Authentication
  • UMTS ciphering procedures
  • Security threats to UMTS and LTE

Security in UTRAN

  • Typical threats in UTRAN
  • Mutual authentication
  • Cryptography for authentication
  • UTRAN encryption
  • Integrity protection of RRC signalling

Security in UMTS Core Network

  • Typical Threats in Core Network
  • Denial of Services
  • IPSec
  • Authentication Server
  • Network Domain
  • MAP application layer security

Authentication and Key Management (AKA)

  • Authentication parameters
  • AV and K
  • RAND
  • SQN and AK
  • AMF and MAC
  • CK and IK
  • RES and X-RES
  • AUTN and AUTS
  • Normal AKA procedure
  • AKA procedure in the AuC
  • AKA procedure in the USIM
  • AKA procedure in the VLR/SGSN

AKA Algorithms

  • AKA Functions with their outputs
  • Cryptographic functions and algorithms
  • Key generating functions
  • Authentication parameters
  • Integrity function
  • Confidentiality function
  • f0, f1 and f1*
  • f2, f3, and f4
  • f5, f5*, f8 and f9

LTE (Long Term Evolution) Security

  • Security procedures performed within the Evolved Packet System (EPS)
  • Evolved Packet Core (EPC)
  • Evolved UTRAN (E-UTRAN)
  • LTE/SAE and Home (e)NB Security
  • System Architecture Evolution (SAE) Security Architecture
  • Authentication and Key Agreement
  • HSS Authentication Data and MME
  • Overview of Diameter Protocol
  • Challenge-response Authentication and Key Agreement Procedure between MME and UE
  • Confidentiality and Integrity of Signaling
  • User Plane Confidentiality
  • Cryptographic Network Separation
  • Home (e) Node B security
  • Threats
  • Countermeasures
  • Security Performance Measurements
  • Managing Mobile App Security

LTE Security Procedures

  • Security Procedures between UE and EPC Network Elements
  • Security Procedures between UE and EPC Access Network Elements
  • Security mechanisms for non-access stratum signaling
  • Security interlocking between E-UTRAN and UTRAN
  • Security interworking between E-UTRAN and GERAN

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: